data centers

Results 1 - 25 of 434Sort Results By: Published Date | Title | Company Name
Published By: SecureAuth     Published Date: Aug 08, 2017
Office 365 has eclipsed all other cloud applications to emerge as the most widely used enterprise cloud service by user count. Its easy to understand why: With Office 365, organizations no longer have to pay for hardware or resources to manage software in their own data centers, and their users always have the latest versions of applications. But Office 365 comes with significant security concerns, especially as organizations store more and more sensitive and business-critical data there. One study reports that virtually every organization experiences at least one cloud-based threat each month and the average has soared to nearly 6 incidents every week. What can organizations do to protect their Office 365 environments? Read the white paper to learn.
Tags : 
    
SecureAuth
Published By: Juniper Networks     Published Date: Aug 08, 2017
Business evolution and technology advancements during the last decade have driven a sea change in the way data centers are funded, organized, and managed. Enterprises are now focusing on a profound digital transformation which is a continuous adjustment of technology management resources to deliver business results, guided by rapid review of desired outcomes related to end clients, resources, and budget constraints. These IT transitions are very much part of the competitive landscape, and executed correctly, they become competitive differentiators and enable bottom line growth. These outcomes are driving data centers to virtualization, service-oriented architectures, increased cybersecurity, big data, and cloud, to name a few of the key factors. This is completely rethinking and retooling the way enterprises handle the applications, data, security, and access that constitute their critical IT resources. In essence, cloud is the new IT.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
    
Juniper Networks
Published By: APC by Schneider Electric     Published Date: Feb 09, 2011
In the broadening data center cost-saving and energy efficiency discussion, data center physical infrastructure preventive maintenance (PM) is sometimes neglected as an important tool for controlling TCO and downtime. PM is performed specifically to prevent faults from occurring. IT and facilities managers can improve systems uptime through a better understanding of PM best practices.
Tags : 
absolute, data protection, maitenance, ups, physical infrastructure, infrastructure, data loss protection, dlp
    
APC by Schneider Electric
Published By: HARTING     Published Date: Mar 24, 2017
Learn how using a connectorized cable assembly streamlines the entire Data Center by decreasing costs and installation time while increasing profitability.
Tags : 
data center, data center power, power, pdu, power supply, internetworking hardware, blade servers, power and cooling
    
HARTING
Published By: QTS     Published Date: Nov 04, 2016
At the heart of the Data Solved promise are three core attributes - People Powered, Technology Focused and Infrastructure Invested. We leverage our strong, diverse team of more than 700 employees to enable our Powered by People motto and deliver on our promise. With 24 data centers on four continents, we are poised to deliver world-class infrastructure and value added technology services to our more than 1,000 customers in North America, Europe, Asia andAustralia.
Tags : 
data centers, infrastructure, value added technology services, data security, data center, colocation, cloud needs, security
    
QTS
Published By: HPE Intel     Published Date: Jan 11, 2016
A famous architect once said that the origin of architecture was defined by the first time two bricks were put together well. And the more bricks you have, the more important putting them together well becomes. The same holds true in our data centers. The architecture of our compute, storage and network devices has always been important, but as the demands on our IT infrastructures grow, and we add more bricks, the architecture becomes more critical.
Tags : 
    
HPE Intel
Published By: Dell EMC     Published Date: Sep 12, 2016
VCE pioneered Converged Infrastructure with the introduction of Vblock Systems in 2009, and today weve helped more than 1,200 global enterprise customers transform their IT environments to become more agile, reliable, and cost-effective. Dell EMC brings together best-of-breed technologies in converged Vblock Systems and VxBlock Systems solutions to power data centers and simplify management and operations throughout the system life cycle.
Tags : 
    
Dell EMC
Published By: Cisco     Published Date: Jul 08, 2016
So what do end-userscompanies in the process of building or upgrading their data centers todaythink of the security problems they face? We conducted this survey to answer key questions about buyers plans for security in their data centers.
Tags : 
    
Cisco
Published By: Equinix     Published Date: May 18, 2015
Download this infographic now to discover how you can help address the challenges of a rapidly changing business world.
Tags : 
equinix, equinix data centers, benefits to equinix, platform equinix, data center, strategic markets, connect to the markets, be global
    
Equinix
Published By: Equinix     Published Date: May 28, 2015
This paper illustrates different perspectives on building a secure and flexible data center platform that sustains growth and innovation and delivers a serious competitive advantage.
Tags : 
data center, strategic business advantage, hybrid, technology, it demands, data center platform, equinix, equinix solutions
    
Equinix
Published By: Cisco     Published Date: Feb 13, 2015
Download the white paper to see how Cisco provides a cost-effective solution for migration from 10-Gbps to 40-Gbps infrastructure.
Tags : 
bidi transceiver, cisco, fiber density, bidi technology, migration, connectivity, data centers, infrastructure
    
Cisco
Published By: Digital Realty     Published Date: Feb 24, 2015
Sometimes finding the right solution is a question of balance. If youve built data centers in the past and you have specific requirements, wouldnt you naturally just want to build your own facility? For one Digital Realty client this was the question that they faced but the right solution turned out to be a little different than they originally thought. What was the solution?
Tags : 
colocation, hosting, data center, it management, data management
    
Digital Realty
Published By: Digital Realty     Published Date: Feb 24, 2015
SingleHop was interested in adding capacity to its data centers while at the same time achieving a predictable cost structure using an outsourcing strategy for the development and management of these mission critical facilities. Find out why they turned to Digital Realty.
Tags : 
cloud iaas, data center, cloud computing, development, it management, data management, infrastructure
    
Digital Realty
Published By: Delphix     Published Date: May 03, 2016
High-profile data breaches continue to make headlines as organizations struggle to manage information security in the face of rapidly changing applications, data centers, and the cloud. Against this backdrop, data masking has emerged as one of the most effective ways to protect sensitive test data from insider and outsider threats alike. While masking is now the de facto standard for protecting non-production data, implementing it alongside virtual data technologies has elevated its effectiveness even further.
Tags : 
    
Delphix
Published By: Dell EMC     Published Date: Nov 05, 2015
IT organizations are aggressively virtualizing their data centers, creating private cloud environments that help them reduce capital infrastructure and data center costs, improve security, and simplify management. However, potential hurdles, if left unaddressed, can get in the way of fully benefiting from a private cloud. Download this summary to learn more.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 10, 2015
No matter how advanced data centers may become, they remain in a perpetual state of change in order to meet the demands of virtualized environments. But with the advent of software-defined storage (SDS) architecture, capabilities associated with hyperconverged technologies (including compute, storage, and networking), help data centers meet virtualization requirements with less administrator intervention at webscale.
Tags : 
    
Dell EMC
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.
Tags : 
security application, data centers, data, cyber-attacks, security, prevent cyber-attacks, anti spam, anti spyware
    
Kaspersky Lab Australia and New Zealand
Published By: Dell EMC     Published Date: May 10, 2017
IT departments in organizations of all types are looking to increase the agility, scalability, and cost-effectiveness of their data centers and storage initiatives. While the cloud, hybrid cloud, and private cloud options tend to be the first options that come to mind for many of these IT professionals, many are finding that hyperconverged infrastructures provide many of the same benefits. In this Enterprise Strategy Group white paper, uncover the many benefits of hyperconverged infrastructures and information on Dell EMC and Intel's Hyperconverged VxRack System 1000.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 10, 2017
While just about everyone is writing about how IT and the businesses it serves need to be transformed, the actual industry answers to both digital and IT transformation remain unclear at best. Are transformational initiatives all about analytics and big data? Or are they about the move to cloud in all its varieties? Support for mobile? More agile ways of working and developing software? Or are they actually all about crafting teams to promote more proactive dialog between the business and IT? The truth is, of course, digital and IT transformation depend on all of the above and more. They also depend on a resilient infrastructure thats easily adapted to changing business priorities without requiring long hours spent on maintenance, updates, and addressing problems of service availability. But making all this work clearly and cohesively is far beyond the purview of almost any solution todaywhether from a software management perspective or from a hardware infrastructure perspective.
Tags : 
    
Dell EMC
Published By: Alert Logic     Published Date: Aug 25, 2014
The Security Operations Center (SOC) is where security data is transformed into an effective response to attacks. From investigating threats and scanning for vulnerabilities, to reverse-engineering malware and developing new security content to identify the latest threats, the SOC is a critical piece of the security puzzle. Learn how Alert Logics SOC operates to protect IT infrastructure from on-premises data centers to the cloud.
Tags : 
    
Alert Logic
Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, datacenters, enterprise, linux, security mechanisms, network firewalls
    
Red Hat
Published By: ServiceNow     Published Date: Oct 02, 2015
Technology has become the heart and soul of every business. The hardware boundaries of IT have exploded beyond data centers, with mobile devices in the hands of both employees and customers alike. Application options have blossomed, from traditional to open source to software-as-a-service. Business has become global, bringing with it a demand for round-the-clock agility. Employees expect that the applications they use at work should be as easy to use as the Web apps they use at home. Integration remains difficult, because its sometimes impossible to know what will happen when someone tries to pluck one strand out of the pile. IT workload and system complexity will only get more challenging, bringing the need for disintermediation through service automation.
Tags : 
    
ServiceNow
Published By: VMware     Published Date: Oct 05, 2015
Undoubtedly you are aware of network virtualization, but perhaps youve yet to hear a compelling case for it. If the extended network capabilities and simplified management enabled by network virtualization arent compelling enough reasons, data center security should be. To manage todays coordinated and persistent security threats, which often come from within, data centers need to implement Zero Trust networking. Virtualization puts it within your reach. Discover why download this free business case white paper now.
Tags : 
vmware, network virtualization, data center, data security, vmware nsx, zero trust, zero trust network, networking
    
VMware
Published By: VMware     Published Date: Oct 05, 2015
Security breaches targeting government and military data centers are increasing. Attackers have learned to defeat current means of physical network security, which emphasize perimeter defense. Today, organizations must protect the workloads inside the data center, utilizing a concept called micro-segmentation to build a Zero Trust network. But that has been unrealistic, requiring too great an investment in hardware, time, and manpower until now, that is. Download this use case from VMware and Carahsoft now to learn why.
Tags : 
vmware, cybersecurity, vmware nsx, security breach solutions, microsegmentation, zero trust, zero trust network, carahsoft
    
VMware
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.